Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [Security-news] Encrypt - Moderately Critical - Weak Encryption - SA-CONTRIB-2015-166

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [Security-news] Encrypt - Moderately Critical - Weak Encryption - SA-CONTRIB-2015-166


Chronologisch Thread 
  • From: security-news AT drupal.org
  • To: security-news AT drupal.org
  • Subject: [IT-SecNots] [Security-news] Encrypt - Moderately Critical - Weak Encryption - SA-CONTRIB-2015-166
  • Date: Wed, 18 Nov 2015 20:33:19 +0000 (UTC)
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>

View online: https://www.drupal.org/node/2618362

* Advisory ID: DRUPAL-SA-CONTRIB-2015-166
* Project: Encrypt [1] (third-party module)
* Version: 7.x
* Date: 2015-November-18
* Security risk: 11/25 ( Moderately Critical)
AC:Complex/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2]
* Vulnerability: Weak Encryption

-------- DESCRIPTION
---------------------------------------------------------

This module enables you to encrypt data within Drupal using a
user-configurable encryption method and key provider.

The module did not sufficiently validate good configurations and api usage
resulting in multiple potential weaknesses depending on module usage. The
default encryption method could theoretically leak the key for known
plaintexts. This vulnerability is mitigated by the fact that an attacker
would need to have access to the encrypted data which is generally not
possible without a breach of the database.

The default key provider uses the Drupal private key, which means that it
could potentially be leaked which puts other elements of the site at risk.
This vulnerability is mitigated by requiring the default combination of
encryption method and key provider for the Drupal private key to be
potentially leaked. Users of the module are likely to employ a key of their
own creation, rather than use the Drupal private key.

Another encryption method included with the module uses a cipher that can
leak structural information about the plaintext. This vulnerability is
mitigated by the fact that it would only affect encryptions of large
quantities of data, such as files and data of shorter lengths would not be
affected.

The default key created by the module is generated by a MD5 hash, which is
not as strong as using truly random bytes of data.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

* Encrypt 7.x-2.x versions prior to 7.x-2.2.

Drupal core is not affected. If you do not use the contributed Encrypt [4]
module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

* If you use the Encrypt module for Drupal 7.x, upgrade to Encrypt 7.x-2.2
[5]

Once installed, review your settings and alter it to use a key provider and
encryption method that is not deprecated. If data was encrypted with a
deprecated key provider or encryption method then you should also re-encrypt
all that data.

Also see the Encrypt [6] project page.

-------- REPORTED BY
---------------------------------------------------------

* Heine Deelstra [7] of the Drupal Security Team

-------- FIXED BY
------------------------------------------------------------

* Rick Hawkins [8] the module maintainer
* Greg Knaddison [9] of the Drupal Security Team
* Heine Deelstra [10] of the Drupal Security Team

-------- COORDINATED BY
------------------------------------------------------

* Greg Knaddison [11] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].

Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]


[1] https://www.drupal.org/project/encrypt
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/encrypt
[5] https://www.drupal.org/node/2618254
[6] https://www.drupal.org/project/encrypt
[7] https://www.drupal.org/user/17943
[8] https://www.drupal.org/user/352283
[9] https://www.drupal.org/user/36762
[10] https://www.drupal.org/user/17943
[11] https://www.drupal.org/user/36762
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity

_______________________________________________
Security-news mailing list
Security-news AT drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news



  • [IT-SecNots] [Security-news] Encrypt - Moderately Critical - Weak Encryption - SA-CONTRIB-2015-166, security-news, 18.11.2015

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang